12.07.2015 Views

w3af Guide de l'Utilisateur - Exploit Database

w3af Guide de l'Utilisateur - Exploit Database

w3af Guide de l'Utilisateur - Exploit Database

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

......The URL: http://localhost/beef/hook/ has DAV methods enabled:- OPTIONS- GET- HEAD- POST- TRACE- PROPFIND- PROPPATCH- COPY- MOVE- LOCK- UNLOCK- DELETE ( is possibly enabled too, not tested for safety )New URL found by discovery:http://localhost/<strong>w3af</strong>/globalRedirect/wargame/New URL found by discovery:http://localhost/<strong>w3af</strong>/globalRedirect/<strong>w3af</strong>-site.tgzAprès la fin <strong>de</strong> la phase <strong>de</strong> découverte, un résumé est présenté à l'utilisateur:The list of found URLs is:- http://localhost/<strong>w3af</strong>/globalRedirect/<strong>w3af</strong>.testsite.tgz- http://localhost/beef/hook/beefmagic.js.php- http://localhost/<strong>w3af</strong>/globalRedirect/2.php– http://localhost/<strong>w3af</strong>/webSpi<strong>de</strong>r/11.html...Une section du résumé présente les points d'injection qui vont être utilisés durantla phase d'audit:Found 78 URLs and 102 different points of injection.The list of Fuzzable requests is:- http://localhost/<strong>w3af</strong>/ | Method: GET

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!